chompie1337 / s8_2019_2215_poc
PoC 2019-2215 exploit for S8/S8 active with DAC + SELinux + Knox/RKP bypass
☆227Updated 4 years ago
Alternatives and similar repositories for s8_2019_2215_poc:
Users that are interested in s8_2019_2215_poc are comparing it to the libraries listed below
- ☆172Updated 4 years ago
- ☆103Updated 5 years ago
- Research related☆87Updated 3 years ago
- Exploits for Android Binder bug CVE-2020-0041☆234Updated 5 years ago
- Frida-based general purpose fuzzer☆215Updated 4 years ago
- A basic PoC leak for CVE-2021-28663 (Internal of the Android kernel backdoor vulnerability)☆121Updated 3 years ago
- A proper well structured documentation for getting started with chrome pwning & v8 pwning☆193Updated 2 years ago
- Fuzzing harness for testing proprietary image codecs supported by Skia on Android☆348Updated 4 years ago
- Coverage-guided binary fuzzing powered by Frida Stalker☆182Updated 4 years ago
- ☆194Updated 3 years ago
- A Minimalist Instruction Extender for the ARM architecture and IDA Pro☆199Updated 8 months ago
- ☆56Updated 3 months ago
- This repository contains the tools we used in our research on the Google Titan M chip☆185Updated 2 years ago
- A Binary Ninja plugin for vulnerability research.☆294Updated 7 months ago
- An example on how to do performant in-memory fuzzing with AFL++ and Frida☆138Updated 5 years ago
- ☆112Updated last year
- fpicker is a Frida-based fuzzing suite supporting various modes (including AFL++ in-process fuzzing)☆276Updated 2 months ago
- Temproot for Pixel 2 and Pixel 2 XL via CVE-2019-2215☆117Updated 5 years ago
- Vulnerability research notes for VirtualBox and QEMU. Contains debug environment setup notes, a PoC template, exploit primitive notes, an…☆186Updated last year
- ☆159Updated 5 years ago
- Collection of scripts for reversing Qualcomm Hexagon baseband / modem firmware☆161Updated last year
- Research material and Proof-of-Concepts for Aleph Research Findings☆89Updated 3 years ago
- Reverse-engineering tools and exploits for Samsung's implementation of TrustZone☆150Updated 5 years ago
- Binary code coverage visualizer plugin for Ghidra☆290Updated 10 months ago
- Zenith exploits a memory corruption vulnerability in the NetUSB driver to get remote-code execution on the TP-Link Archer C7 V5 router fo…☆129Updated 3 years ago
- A WIP "Vulnerable by Design" kext for iOS/macOS to play & learn *OS kernel exploitation☆229Updated 4 years ago
- A collection of my Ghidra scripts to facilitate reverse engineering and vulnerability research.☆253Updated 5 months ago
- idahunt is a framework to analyze binaries with IDA Pro and hunt for things in IDA Pro☆385Updated last year
- 0day VirtualBox 6.1.2 Escape for RealWorld CTF 2020/2021 CVE-2021-2119☆139Updated 4 years ago
- IDA Pro to Ghidra Key Bindings to feel like if you were in IDA Pro when navigating☆89Updated 6 years ago